11 resultados para Medium Access Control (MAC)
em BORIS: Bern Open Repository and Information System - Berna - Suiça
Resumo:
Energy efficiency is a major concern in the design of Wireless Sensor Networks (WSNs) and their communication protocols. As the radio transceiver typically accounts for a major portion of a WSN node’s power consumption, researchers have proposed Energy-Efficient Medium Access (E2-MAC) protocols that switch the radio transceiver off for a major part of the time. Such protocols typically trade off energy-efficiency versus classical quality of service parameters (throughput, latency, reliability). Today’s E2-MAC protocols are able to deliver little amounts of data with a low energy footprint, but introduce severe restrictions with respect to throughput and latency. Regrettably, they yet fail to adapt to varying traffic load at run-time. This paper presents MaxMAC, an E2-MAC protocol that targets at achieving maximal adaptivity with respect to throughput and latency. By adaptively tuning essential parameters at run-time, the protocol reaches the throughput and latency of energy-unconstrained CSMA in high-traffic phases, while still exhibiting a high energy-efficiency in periods of sparse traffic. The paper compares the protocol against a selection of today’s E2-MAC protocols and evaluates its advantages and drawbacks.
Resumo:
The paper presents a link layer stack for wireless sensor networks, which consists of the Burst-aware Energy-efficient Adaptive Medium access control (BEAM) and the Hop-to-Hop Reliability (H2HR) protocol. BEAM can operate with short beacons to announce data transmissions or include data within the beacons. Duty cycles can be adapted by a traffic prediction mechanism indicating pending packets destined for a node and by estimating its wake-up times. H2HR takes advantage of information provided by BEAM such as neighbour information and transmission information to perform per-hop congestion control. We justify the design decisions by measurements in a real-world wireless sensor network testbed and compare the performance with other link layer protocols.
Resumo:
Reliable data transfer is one of the most difficult tasks to be accomplished in multihop wireless networks. Traditional transport protocols like TCP face severe performance degradation over multihop networks given the noisy nature of wireless media as well as unstable connectivity conditions in place. The success of TCP in wired networks motivates its extension to wireless networks. A crucial challenge faced by TCP over these networks is how to operate smoothly with the 802.11 wireless MAC protocol which also implements a retransmission mechanism at link level in addition to short RTS/CTS control frames for avoiding collisions. These features render TCP acknowledgments (ACK) transmission quite costly. Data and ACK packets cause similar medium access overheads despite the much smaller size of the ACKs. In this paper, we further evaluate our dynamic adaptive strategy for reducing ACK-induced overhead and consequent collisions. Our approach resembles the sender side's congestion control. The receiver is self-adaptive by delaying more ACKs under nonconstrained channels and less otherwise. This improves not only throughput but also power consumption. Simulation evaluations exhibit significant improvement in several scenarios
Resumo:
Over the past several years, a number of design approaches in wireless mesh networks have been introduced to support the deployment of wireless mesh networks (WMNs). We introduce a novel wireless mesh architecture that supports authentication and authorisation functionalities, giving the possibility of a seamless WMN integration into the home's organization authentication and authorisation infrastructure. First, we introduce a novel authentication and authorisation mechanism for wireless mesh nodes. The mechanism is designed upon an existing federated access control approach, i.e. the AAI infrastructure that is using just the credentials at the user's home organization in a federation. Second, we demonstrate how authentication and authorisation for end users is implemented by using an existing web-based captive portal approach. Finally, we observe the difference between the two and explain in detail the process flow of authorized access to network resources in wireless mesh networks. The goal of our wireless mesh architecture is to enable easy broadband network access to researchers at remote locations, giving them additional advantage of a secure access to their measurements, irrespective of their location. It also provides an important basis for the real-life deployment of wireless mesh networks for the support of environmental research.
Resumo:
In this paper, we investigated whether bcl-xL can be involved in the modulation of the angiogenic phenotype of human tumor cells. Using the ADF human glioblastoma and the M14 melanoma lines, and their derivative bcl-xL-overexpressing clones, we showed that the conditioned medium of bcl-xL transfectants increased in vitro endothelial cell functions, such as proliferation and morphogenesis, and in vivo vessel formation in Matrigel plugs, compared with the conditioned medium of control cells. Moreover, the overexpression of bcl-xL induced an increased expression of the proangiogenic interleukin-8 (CXCL8), both at the protein and mRNA levels, and an enhanced CXCL8 promoter activity. The role of CXCL8 on bcl-xL-induced angiogenesis was validated using CXCL8-neutralizing antibodies, whereas down-regulation of bcl-xL through antisense oligonucleotide or RNA interference strategies confirmed the involvement of bcl-xL on CXCL8 expression. Transient overexpression of bcl-xL led to extend this observation to other tumor cell lines with different origin, such as colon and prostate carcinoma. In conclusion, our results showed that CXCL8 modulation by bcl-xL regulates tumor angiogenesis, and they point to elucidate an additional function of bcl-xL protein.
Resumo:
In this paper we follow a theory-based approach to study the assimilation of compliance software in highly regulated multinational enterprises. These relatively new software products support the automation of controls which are associated with mandatory compliance requirements. We use institutional and success factor theories to explain the assimilation of compliance software. A framework for analyzing the assimilation of Access Control Systems (ACS), a special type of compliance software, is developed and used to reflect the experiences obtained in four in-depth case studies. One result is that coercive, mimetic, and normative pressures significantly effect ACS assimilation. On the other hand, quality aspects have only a moderate impact at the beginning of the assimilation process, in later phases the impact may increase if performance and improvement objectives become more relevant. In addition, it turns out that position of the enterprises and compatibility heavily influence the assimilation process.
Resumo:
Introduction: Video‐Supported Learning is particularly effective when it comes to skills and behaviors. Video registration of patient‐physician interviews, class room instruction or practical skills allow it to learners themselves, their peers, and their tutors to assess the quality of the learner's performance, to give specific feedback, and to make suggestions for improvement. Methods: In Switzerland, four pedagogical universities and two medical faculties joined to initiate the development of a national infrastructure for Video Supported Learning. The goal was to have a system that is simple to use, has most steps automated, provides the videos over the Internet, and has a sophisticated access control. Together with SWITCH, the national IT‐Support‐Organisation for Swiss Universities, the program iVT (Individual Video Training) was developed by integrating two preexisting technologies. The first technology is SWITCHcast, a podcast system. With SWITCHcast, videos are automatically uploaded to a server as soon as the registration is over. There the videos are processed and converted to different formats. The second technology is the national Single Logon System AAI (Authentification and Authorization Infrastructure) that enables iVT to link each video with the corresponding learner. The learner starts the registration with his Single Logon. Thus, the video can unambiguously be assigned. Via his institution's Learning Management System (LMS), the learner can access his video and give access to his video to peers and tutors. Results: iVT is now used at all involved institutions. The system works flawlessly. In Bern, we use iVT for the communications skills training in the forth and sixth year. Since students meet with patient actors alone, iVT is also used to certify attendance. Students are encouraged to watch the videos of the interview and the feedback of the patient actor. The offer to discuss a video with a tutor was not used by the students. Discussion: We plan to expand the use of iVT by making peer assessment compulsory. To support this, annotation capabilities are currently added to iVT. We also want to use iVT in training of practical skills, again for self as well as for peer assessment. At present, we use iVT for quality control of patient actor's performance.
Resumo:
BACKGROUND Cell-free foetal haemoglobin (HbF) has been shown to play a role in the pathology of preeclampsia (PE). In the present study, we aimed to further characterize the harmful effects of extracellular free haemoglobin (Hb) on the placenta. In particular, we investigated whether cell-free Hb affects the release of placental syncytiotrophoblast vesicles (STBMs) and their micro-RNA content. METHODS The dual ex-vivo perfusion system was used to perfuse isolated cotyledons from human placenta, with medium alone (control) or supplemented with cell-free Hb. Perfusion medium from the maternal side of the placenta was collected at the end of all perfusion phases. The STBMs were isolated using ultra-centrifugation, at 10,000×g and 150,000×g (referred to as 10K and 150K STBMs). The STBMs were characterized using the nanoparticle tracking analysis, identification of surface markers and transmission electron microscopy. RNA was extracted and nine different micro-RNAs, related to hypoxia, PE and Hb synthesis, were selected for analysis by quantitative PCR. RESULTS All micro-RNAs investigated were present in the STBMs. Mir-517a, mir-141 and mir-517b were down regulated after Hb perfusion in the 10K STBMs. Furthermore, Hb was shown to be carried by the STBMs. CONCLUSION This study showed that Hb perfusion can alter the micro-RNA content of released STBMs. Of particular interest is the alteration of two placenta specific micro-RNAs; mir-517a and mir-517b. We have also seen that STBMs may function as carriers of Hb into the maternal circulation.
Resumo:
Location prediction has attracted a significant amount of research effort. Being able to predict users’ movement benefits a wide range of communication systems, including location-based service/applications, mobile access control, mobile QoS provision, and resource management for mobile computation and storage management. In this demo, we present MOBaaS, which is a cloudified Mobility and Bandwidth prediction services that can be instantiated, deployed, and disposed on-demand. Mobility prediction of MOBaaS provides location predictions of a single/group user equipments (UEs) in a future moment. This information can be used for self-adaptation procedures and optimal network function configuration during run-time operations. We demonstrate an example of real-time mobility prediction service deployment running on OpenStack platform, and the potential benefits it bring to other invoking services.
Resumo:
Introduction: Discectomy and spinal fusion is the gold standard for spinal surgery to relieve pain. However, fusion can be hindered for yet unknown reasons that lead to non-fusions with pseudo-arthrose. It is hence appealing to develop biomaterials that can enhance bone formation. Clinical observations indicate that presence of residual intervertebral disc (IVD) tissue might hinder the ossification. We hypothesize that BMP-antagonists are constantly secreted by IVD cells and potentially prevent the ossification process. Furthermore, L51P, the engineered BMP2 variant, stimulates osteoinduction of bone marrow-derived mesenchymal stem cells (MSC) by antagonizing BMP-inhibitors. Methods: Human MSCs, primary nucleus pulposus (NPC) and annulus pulposus cells (AFC) were isolated and expanded in monolayer cultures up to passage 3. IVD cells were seeded in 1.2% alginate beads (4Mio/mL) and separated by culture inserts from MSCs in a co-culture set-up. MSCs were kept in 1:control medium, 2:osteogenic medium+alginate control, 3:osteogenic medium+NPC (±L51P) and 4:osteogenic medium+AFC (±L51P) for 21 days. Relative gene expression of bone-related genes, Alkaline Phosphatase (ALP) assay and histological staining were performed. Results: Osteogenesis of MSCs was hindered as shown by reduced alizarin red staining in the presence of NPC. No such inhibition was observed if co-cultured with alginate only or in the presence of AFC. The results were confirmed on the RNA and protein level. Addition of L51P to the co-cultures induced mineralization of MSCs, however a reduced ALP was observed. Conclusion: We demonstrated that NPC secrete BMP-antagonists that prevent osteogenesis of MSCs and L51P can antagonize BMP-antagonists and induce bone formation.